Train On-Demand
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreKnowing how to properly design a secure infrastructure is just as important as being able to properly configure the security controls themselves. In this course, we go through what should be considered during the planning process, including network design, authentication and authorization controls, and the importance of a well-thought-out logging infrastructure. In addition, you'll also learn about how to identify threats to your infrastructure and methods to choose proper countermeasures for those threats through a process known as threat modeling.
Instructor for this course
Brian Olliff
Defensive Cyber Security
Course Introduction
Basic Security Principles
What is Secure Architecture?
General Principles of Secure Architecture
Secure Architecture Goals
Secure the Users
Secure Infrastructure
Threat Modeling
Secure Architecture Planning
Creating a Secure Network
Logging
Disaster Recovery
Documenting the Secure Architecture
Course Conclusion
Take your technical training into your own hands and stay engaged with our learn-by-doing platform where you can put your skills to the test with hands-on exercises, quizzes, and labs.
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreINE quizzes, labs, projects, and exercises help reinforce your knowledge.
Learn MoreOrganized training helps guide you through the most relevant subjects for certification prep.
Learn MoreWe add new courses and learning materials to the platform weekly so you're always up-to-date.
Learn MoreIf you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?